The Implementation of IKEV2 for IPSec

  • Xiaojin YangEmail author
  • Jianhua Liu
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 142)


According to the characteristic of IKEv2 key exchange mechanism, this paper is designed and realized the frame construction and the module constitution of IKEv2. Establishing the transform relations between the exchange states and the news operation, this research had determined the message handling step and the key exchange flow. It also produced the detailed elaboration to each function module concrete realization.


IPSec IKEV2 Load Message handling 


  1. 1.
    Ari Huttunen, UDP Encapsulation of IPsec Packets.
  2. 2.
    Petersen, R.: Linux Technology Guinness, vol. 1. Mechanical industry press, Brussels (2002)Google Scholar
  3. 3.
    Davis, C.R.: IPsec: VPN Security Implementation, vol. 1. Tsinghua University Press, Beijing (2002)Google Scholar
  4. 4.
    Yonghe, L.: IP Based End to End Security Model of Communication Network Analysis and Design, vol. P1, pp. 3–10. Micro computer information, Beijing (2005)Google Scholar

Copyright information

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015

Authors and Affiliations

  1. 1.Department of Information EngineeringGuilin University of Aerospace TechnologyGuilinChina

Personalised recommendations